Sciweavers

6656 search results - page 1112 / 1332
» Change, Change, Change: Three Approaches
Sort
View
IEEECIT
2010
IEEE
13 years 7 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark
IMCSIT
2010
13 years 7 months ago
Fast Construction of Broadcast Scheduling and Gossiping in Dynamic Ad Hoc Networks
This paper studies the minimum latency broadcast schedule (MLBS) problem in ad hoc networks represented by unit disk graphs. In our approach we use an algorithm, which does not nee...
Krzysztof Krzywdzinski
ISLPED
2010
ACM
169views Hardware» more  ISLPED 2010»
13 years 7 months ago
Distributed DVFS using rationally-related frequencies and discrete voltage levels
Abstract--As a replacement for the fast-fading GloballySynchronous model, we have defined a flexible design style called GRLS, for Globally-Ratiochronous, Locally-Synchronous, whic...
Jean-Michel Chabloz, Ahmed Hemani
MASS
2010
13 years 7 months ago
Interactionless calendar-based training for 802.11 localization
This paper presents our work in solving one of the weakest links in 802.11-based indoor-localization: the training of ground-truth received signal strength data. While crowdsourcin...
Andrew J. Barry, Noah L. Tye, Mark L. Chang
MICCAI
2010
Springer
13 years 7 months ago
Synthetic MRI Signal Standardization: Application to Multi-atlas Analysis
From the image analysis perspective, a disadvantage of MRI is the lack of image intensity standardization. Differences in coil sensitivity, pulse sequence and acquisition parameter...
Juan Eugenio Iglesias, Ivo D. Dinov, Jaskaran Sing...
« Prev « First page 1112 / 1332 Last » Next »